Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,296,462 papers from all fields of science
Search
Sign In
Create Free Account
LILI-128
LILI-128 is an LFSR based synchronous stream cipher with a 128-bit key. On 13 November 2000, LILI-128 was presented at the NESSIE workshop. It is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
MATLAB
NESSIE
Outline of cryptography
Stream cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn
Dibyendu Roy
,
S. Mukhopadhyay
IACR Cryptology ePrint Archive
2015
Corpus ID: 9186342
LILI-128 is a clock controlled stream cipher based on two LFSRs with one clock control function and one non-linear filter…
Expand
2013
2013
The Nonlinear Filter Boolean Function of LILI-128 Stream Cipher Generator Is Successfully Broken Based on the Complexity of Nonlinear 0 1 Symbol Sequence
Xiangao Huang
,
Chao Wang
,
Wei Huang
,
Junxian Li
2013
Corpus ID: 62551640
The nonlinear filter Boolean function of LILI-128 stream cipher generator is studied in this paper. First we measure the…
Expand
2012
2012
Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster
G. Avoine
,
A. Bourgeois
,
Xavier Carpent
IACR Cryptology ePrint Archive
2012
Corpus ID: 9776615
Cryptanalytic time-memory trade-offs were introduced by Hellman in 1980 in order to perform key-recovery attacks on cryptosystems…
Expand
2011
2011
On the Stability of m-Sequences
A. Burrage
,
A. Sălăgean
,
R. Phan
IMA Conference on Cryptography and Coding
2011
Corpus ID: 34797452
We study the stability of m-sequences in the sense of determining the number of errors needed for decreasing the period of the…
Expand
2011
2011
Improved multi-pass fast correlation attacks with applications
Bin Zhang
,
D. Feng
Science China Information Sciences
2011
Corpus ID: 30569988
In this paper we propose two new algorithms for multi-pass fast correlation attacks on stream ciphers. The first algorithm aims…
Expand
Review
2007
Review
2007
Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity
Xiangao Huang
,
Wei Huang
,
Xiaozhou Liu
,
Chao Wang
,
Z. Wang
,
Tao Wang
arXiv.org
2007
Corpus ID: 7111061
In this letter we assert that we have reconstructed the nonlinear filter function of LILI-128 stream cipher on IBM notebook PC…
Expand
2006
2006
Algebraic Attacks on Clock-Controlled Stream Ciphers
S. Al-Hinai
,
L. Batten
,
B. Colbert
,
Kenneth Koon-Ho Wong
Australasian Conference on Information Security…
2006
Corpus ID: 32740805
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register…
Expand
Review
2005
Review
2005
ALGEBRAIC ATTACKS ON STREAM CIPHERS (SURVEY)
Dong Hoon Lee
2005
Corpus ID: 17291944
Most stream ciphers based on linear feedback shift registers (LFSR) are vulnerable to recent algebraic attacks. In this survey…
Expand
2002
2002
Ììññ¹ååñóöý Ìööööóó Øøø Ò×ø Äáäá¹½¾¾ ¶ ¶ Êêêì ¹ Ç Blockinøóóö ½½¸¾¼¼½ ¶ ¶
Markku-Juhani Olavi Saarinen
2002
Corpus ID: 261301988
2001
2001
Cryptanalysis of LILI-128
S. Babbage
2001
Corpus ID: 17730969
LILI-128 is a stream cipher that was submitted to NESSIE. Strangely, the designers do not really seem to have tried to ensure…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE